▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
 ╚════════════════════════════════════════════════════════╝ 
▒▒╗    ▒▒╗ ▒▒▒▒▒╗ ▒▒▒▒▒▒╗ ▒▒▒╗   ▒▒╗▒▒╗▒▒▒╗   ▒▒╗ ▒▒▒▒▒▒╗ 
▒▒║    ▒▒║▒▒╔══▒▒╗▒▒╔══▒▒╗▒▒▒▒╗  ▒▒║▒▒║▒▒▒▒╗  ▒▒║▒▒╔════╝ 
▒▒║ ▒╗ ▒▒║▒▒▒▒▒▒▒║▒▒▒▒▒▒╔╝▒▒╔▒▒╗ ▒▒║▒▒║▒▒╔▒▒╗ ▒▒║▒▒║  ▒▒▒╗
▒▒║▒▒▒╗▒▒║▒▒╔══▒▒║▒▒╔══▒▒╗▒▒║╚▒▒╗▒▒║▒▒║▒▒║╚▒▒╗▒▒║▒▒║   ▒▒║
╚▒▒▒╔▒▒▒╔╝▒▒║  ▒▒║▒▒║  ▒▒║▒▒║ ╚▒▒▒▒║▒▒║▒▒║ ╚▒▒▒▒║╚▒▒▒▒▒▒╔╝
 ╚══╝╚══╝ ╚═╝  ╚═╝╚═╝  ╚═╝╚═╝  ╚═══╝╚═╝╚═╝  ╚═══╝ ╚═════╝ 
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
 ╚════════════════════════════════════════════════════════╝ 

How to setup a Bitcoin Air-Gap Computer?
DON'T.

You will almost certainly screw
yourself out of your Bitcoin.
Use a hardware wallet instead.

Computers (incl. Raspberry Pi and other single board linux computers) were not designed to hold secrets, here is just a short list of attacks:

  1. Cold Boot Attacks
  2. The Chilling Reality of Cold Boot Attacks
  3. Academics turn RAM into Wi-Fi cards to steal data from air-gapped systems
  4. Sniffing Keystrokes With Lasers/Voltmeters
  5. Generating Covert Wi-Fi Signals from Air-Gapped Computers
  6. Flaws in self-encrypting SSDs let attackers bypass disk encryption
  7. NSA TEMPEST Attack can remotely view your computer and cell phone screen using radio waves!
  8. LED-it-Go - exfiltrate data from air-gapped systems via an HDD's activity LED
  9. USBee - force a USB connector's data bus give out electromagnetic emissions that can be used to exfiltrate data
  10. AirHopper - use the local GPU card to emit electromagnetic signals to a nearby mobile phone, also used to steal data
  11. Fansmitter - steal data from air-gapped PCs using sounds emanated by a computer's GPU fan
  12. DiskFiltration - use controlled read/write HDD operations to steal data via sound waves
  13. BitWhisper - exfiltrate data from non-networked computers using heat emanations
  14. Unnamed attack - uses flatbed scanners to relay commands to malware infested PCs or to exfiltrate data from compromised systems
  15. GSMem - steal data from air-gapped systems using GSM cellular frequencies
  16. xLED - use router or switch LEDs to exfiltrate data
  17. aIR-Jumper - use a security camera's infrared capabilities to steal data from air-gapped networks
  18. HVACKer - use HVAC systems to control malware on air-gapped systems
  19. MAGNETO & ODINI - steal data from Faraday cage-protected systems
  20. MOSQUITO - steal data from PCs using attached speakers and headphones
  21. PowerHammer - steal data from air-gapped systems using power lines
  22. CTRL-ALT-LED - steal data from air-gapped systems using keyboard LEDs
  23. BRIGHTNESS - steal data from air-gapped systems using screen brightness variations
  24. AiR-ViBeR - steal data using a computer's fan vibrations
  25. POWER-SUPPLaY - steal data by turning the power supply into a speaker
  26. Acoustic attack - steals data from keystrokes with 95% accuracy
  27. list wip, i'm lazy.
How to setup a Bitcoin Air-Gap Computer